Samba : Samba AD DC : Configure DC2019/07/30 |
Configute Samba Active Directory Domain Controller.
This example configures on the environment bellow.
|
|||||||
[1] | Install required packages. |
root@smb:~#
apt -y install samba krb5-config winbind smbclient # if using DHCP. answer [Yes], if static IP, answer [No] +----------------------+ Samba server and utilities +-----------------------+ | | | If your computer gets IP address information from a DHCP server on the | | network, the DHCP server may also provide information about WINS servers | | ("NetBIOS name servers") present on the network. This requires a change | | to your smb.conf file so that DHCP-provided WINS settings will | | automatically be read from /var/lib/samba/dhcp.conf. | | | | The dhcp-client package must be installed to take advantage of this | | feature. | | | | Modify smb.conf to use WINS settings from DHCP? | | | | <Yes> <No> | | | +---------------------------------------------------------------------------+ # specify Realm +------------------+ Configuring Kerberos Authentication +------------------+ | When users attempt to use Kerberos and specify a principal or user name | | without specifying what administrative Kerberos realm that principal | | belongs to, the system appends the default realm. The default realm may | | also be used as the realm of a Kerberos service running on the local | | machine. Often, the default realm is the uppercase version of the local | | DNS domain. | | | | Default Kerberos version 5 realm: | | | | SRV.WORLD________________________________________________________________ | | | | <Ok> | | | +---------------------------------------------------------------------------+ # specify own hostname +------------------+ Configuring Kerberos Authentication +------------------+ | Enter the hostnames of Kerberos servers in the SRV.WORLD Kerberos | | realm separated by spaces. | | | | Kerberos servers for your realm: | | | | smb.srv.world____________________________________________________________ | | | | <Ok> | | | +---------------------------------------------------------------------------+ # specify own hostname +------------------+ Configuring Kerberos Authentication +------------------+ | Enter the hostname of the administrative (password changing) server for | | the SRV.WORLD Kerberos realm. | | | | Administrative server for your Kerberos realm: | | | | smb.srv.world____________________________________________________________ | | | | <Ok> | | | +---------------------------------------------------------------------------+ |
[2] | Configure Samba AD DC. |
# rename or remove the default config root@smb:~# mv /etc/samba/smb.conf /etc/samba/smb.conf.org root@smb:~# samba-tool domain provision # specify Realm Realm [SRV.WORLD]: # specify Domain name Domain [SRV]: SMB01 # Enter with default because it sets DC Server Role (dc, member, standalone) [dc]: # Enter with default because it uses Built-in DNS DNS backend (SAMBA_INTERNAL, BIND9_FLATFILE, BIND9_DLZ, NONE) [SAMBA_INTERNAL]: # if you set DNS forwarder, specify it, if not, specify [none] DNS forwarder IP address (write 'none' to disable forwarding) [10.0.0.10]: 10.0.0.10 # set admin password # Do not set trivial password, if you input it, configuration wizard shows error Administrator password: Retype password: Looking up IPv4 addresses Looking up IPv6 addresses No IPv6 address will be assigned Setting up share.ldb Setting up secrets.ldb Setting up the registry Setting up the privileges database Setting up idmap db Setting up SAM db Setting up sam.ldb partitions and settings Setting up sam.ldb rootDSE Pre-loading the Samba 4 and AD schema Unable to determine the DomainSID, can not enforce uniqueness constraint on local domainSIDs Adding DomainDN: DC=srv,DC=world Adding configuration container Setting up sam.ldb schema Setting up sam.ldb configuration data Setting up display specifiers Modifying display specifiers and extended rights Adding users container Modifying users container Adding computers container Modifying computers container Setting up sam.ldb data Setting up well known security principals Setting up sam.ldb users and groups Setting up self join Adding DNS accounts Creating CN=MicrosoftDNS,CN=System,DC=srv,DC=world Creating DomainDnsZones and ForestDnsZones partitions Populating DomainDnsZones and ForestDnsZones partitions Setting up sam.ldb rootDSE marking as synchronized Fixing provision GUIDs A Kerberos configuration suitable for Samba AD has been generated at /var/lib/samba/private/krb5.conf Merge the contents of this file with your system krb5.conf or replace it with this one. Do not create a symlink! Once the above files are installed, your Samba AD server will be ready to use Server Role: active directory domain controller Hostname: smb NetBIOS Domain: SMB01 DNS Domain: srv.world DOMAIN SID: S-1-5-21-3772837808-1505251784-1375148484
root@smb:~#
root@smb:~# cp /var/lib/samba/private/krb5.conf /etc/ root@smb:~# systemctl stop smbd nmbd winbind root@smb:~# systemctl disable smbd nmbd winbind root@smb:~# systemctl unmask samba-ad-dc systemctl start samba-ad-dc root@smb:~# systemctl enable samba-ad-dc # verify status root@smb:~# smbclient -L localhost -U% Sharename Type Comment --------- ---- ------- netlogon Disk sysvol Disk IPC$ IPC IPC Service (Samba 4.9.5-Debian) Reconnecting with SMB1 for workgroup listing. Server Comment --------- ------- Workgroup Master --------- ------- WORKGROUP NAS |
[3] | Confirm domain level and add a Domain user. |
# confirm domain level root@smb:~# samba-tool domain level show Domain and forest function level for domain 'DC=srv,DC=world' Forest function level: (Windows) 2008 R2 Domain function level: (Windows) 2008 R2 Lowest function level of a DC: (Windows) 2008 R2 # add a domain user root@smb:~# samba-tool user create debian New Password: # set password Retype Password: User 'debian' created successfully |
Sponsored Link |
|